I hadn’t, but the threat actors are now using ZPAQ files to distribute malware. A ZPAQ file is an archive file, like .ZIP and .RAR, it is open source and is used on a command line – so not something the average office-based user would need to know about or …
I am out of the office…
I am out of the office this week and that is why I am going to reproduce an article here, that I wrote last year for CyberAwake about the “Out-of-Office” automatic reply. The Out-of-Office Email and How it Compromises Your Organisation’s Cyber Security Before heading out on our leave, we …
CISA Round-up
I am back in the office this week so let’s get a round-up of the security advisories issued by The US government Cybersecurity and Infrastructure Security Agency (CISA), one of my trusted sources for information about cyber security vulnerabilities. Oracle Releases October 2023 Critical Patch Update Advisory | CISA Fortinet …
LinkedIn Phishing
LinkedIn is extremely popular among business professionals and is a perfectly acceptable social media platform to use and interact with, whilst you are at work. It is designed for just that. So make sure you and your team understand how the platform can easily be abused to steal your credentials. …
You cannot see a zero-point font…
The old trick of using a zero-point font in a document to conceal information you do not want to be readily detected by the reader, is being exploited again in a new way. This time it is being used to show Outlook emails as having been safely scanned when in …